CVE-2024-42416
- EPSS 1.06%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 04.11.2025 17:16:04
The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can explo...
- EPSS 1.48%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 21.11.2024 09:35:00
Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too earl...
CVE-2024-43110
- EPSS 2.82%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 04.11.2025 17:16:05
The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve users...
CVE-2024-45063
- EPSS 7.26%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 04.11.2025 17:16:14
The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code exec...
CVE-2024-8178
- EPSS 3.13%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 04.11.2025 17:16:16
The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on ...
CVE-2024-45287
- EPSS 0.51%
- Veröffentlicht 05.09.2024 04:15:07
- Zuletzt bearbeitet 21.11.2024 09:37:36
A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.
CVE-2024-7589
- EPSS 17.41%
- Veröffentlicht 12.08.2024 13:38:44
- Zuletzt bearbeitet 21.11.2024 09:51:46
A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context...
CVE-2024-6759
- EPSS 0.2%
- Veröffentlicht 12.08.2024 13:38:40
- Zuletzt bearbeitet 21.11.2024 09:50:15
When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, "/". This allows readdir(3) and related functions to return filesystem entries with names containing additional pa...
CVE-2024-6760
- EPSS 0.21%
- Veröffentlicht 12.08.2024 13:38:40
- Zuletzt bearbeitet 21.11.2024 09:50:15
A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs. The bug may be used by an unprivileg...
CVE-2024-6640
- EPSS 0.02%
- Veröffentlicht 12.08.2024 13:38:39
- Zuletzt bearbeitet 26.11.2024 15:15:35
In ICMPv6 Neighbor Discovery (ND), the ID is always 0. When pf is configured to allow ND and block incoming Echo Requests, a crafted Echo Request packet after a Neighbor Solicitation (NS) can trigger an Echo Reply. The packet has to come from the s...